Results 191 to 200 of about 99,257 (234)
Some of the next articles are maybe not open access.
Evaluate Music Genre Using AHP Model
2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021Music genres are labels created and used by humans for categorizing and describing the vast universe of music. In this paper, firstly, after doing the data collecting and preprocessing, we find out the parameters to describe music genres and conduct correlation analysis to eliminate the redundant factors with high correlation.
Jiaming Li +3 more
openaire +1 more source
Supply chain risk modeling by AHP and Fuzzy AHP methods
Journal of Risk Research, 2013Supply chain management is a discipline dealing with organization, coordination, and optimization of relations within supply chains. Complexity and dynamics of supply chains are not always proportional to their reliability, and supply chain risk management becomes a very important tool in minimizing risk and uncertainties caused by, or impacting on ...
Gordana Radivojević, Vladimir Gajović
openaire +1 more source
Comparison of AHP and fuzzy AHP models for prioritization of watersheds
Soft Computing, 2019Prioritization of watersheds for conservation measures is essential for a variety of functions, such as flood control projects for which determining areas of top priority is a managerial decision that should be based on physical, social, and economic characteristic of the region of interest and the outcome of past operations.
Sarita Gajbhiye Meshram +3 more
openaire +1 more source
Applying AHP for Collaborative Modeling Evaluation
International Journal of Information System Modeling and Design, 2013Collaborative modeling is one of the approaches used to enhance productivity in many enterprise modeling and system development projects. Determining the success of such a collaborative effort needs an evaluation of a number of factors which affect the quality of not only the end-products – the models, but also that of other modeling artifacts: the ...
Denis Ssebuggwawo +2 more
openaire +2 more sources
AHP Based Trust Model in VANETs
2013 5th International Conference on Computational Intelligence and Communication Networks, 2013In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter
Deepika Saraswat +1 more
openaire +1 more source
2016
In many situations, it is necessary to add sub-criteria to one or more of the original criteria. The process is very straightforward as it will be shown here.
Enrique Mu, Milagros Pereyra-Rojas
openaire +1 more source
In many situations, it is necessary to add sub-criteria to one or more of the original criteria. The process is very straightforward as it will be shown here.
Enrique Mu, Milagros Pereyra-Rojas
openaire +1 more source
Proposals of AHP-Type of Disaggregate Logit Model and Improved AHP Model in Modal Choice
Applied Mechanics and Materials, 2013This paper aims at constructing an improved model of modal choice by the use of both of AHP model and disaggregate logit model. Firstly, using AHP structure model, the importance of various factors in modal choice is investigated, and relevant choosing consciousness is scored.
openaire +1 more source
AHP-Driven Knowledge Leakage Risk Assessment Model
International Journal of Knowledge and Systems Science, 2016Intellectual Capital (IC) is becoming more widely understood by the academic and business communities, especially its important role in value creation of an organization. However, few people are aware that IC, if not managed properly, may also pose threats, sometime serious, to an organization.
Tsang, HWC, Lee, WB, Tsui, E
openaire +2 more sources
Information security management model based on AHP
Proceedings of 2012 International Conference on Measurement, Information and Control, 2012Information security is the most fundamental basis in the management, the objectivity and accuracy of information security risk assessment play an important role to safeguard the information security In view of the problem on how to evaluate information security, a method of management combined qualitative analysis with quantitative computation is ...
null Wenli Geng, null Yingsong Hu
openaire +1 more source
An AHP model of DSS effectiveness
European Journal of Information Systems, 1999Empirical studies have reported equivocal, or even dysfunctional, results from the use of decision support systems (DSS). Recent examples are the Davis, Kottemann, and Remus production planning experiments. According to the researchers, these experiments demonstrate that DSS what-if analysis creates an ‘illusion of control’ that causes users to ...
openaire +1 more source

